Firewall Wizards mailing list archives
RE: separating the servers on a switch
From: "Ian Webb" <webbi () sapc edu>
Date: Sat, 14 Sep 2002 13:34:05 -0400
You could also use a firewall that lets you set policies between VLANs on the same interface. I know Netscreens can do that, not sure about other firewalls. -----Original Message----- From: firewall-wizards-admin () honor icsalabs com [mailto:firewall-wizards-admin () honor icsalabs com] On Behalf Of m p Sent: Thursday, September 12, 2002 2:43 PM To: Shimon Silberschlag Cc: firewall-wizards () honor icsalabs com Subject: Re: [fw-wiz] separating the servers on a switch [ Sorry, i hit send too fast. I'm resending it full :)] --- Shimon Silberschlag <shimons () bll co il> schrieb: > The servers need to talk with the uplink (internet) servers, the
downlink (backend) servers. This is trivially done with the firewalls. What we want to do is control which servers on the segment talk among themselves. Shimon Silberschlag
The only way to solve the problem I can think of is to install more firewalls / paketfilters and give each server a seperate interface on that firewall. It would look like this ( in good old ASCII art): Internet | | screening router / Firewall (already in place) | | Public DMZ Firewall - Server 1 | | |__ Server 2 | |____ Server 3 | | screening router / Firewall (already in place) | | Private DMZ Firewall - Server 1 | |__ Server 2 |____ Server 3 VLANs are not secure. You may circumvent them. Even if you define VLANs - how do you control the traffic in them? The smoothest way to do that is from my point of view to install *BSD (or if you are more familiar the word with L.... ;), put them into bridging mode and install a kind of paket filter (perhaps with a self-train phase) upon them. Put a managment link with an IP into them. Voila. Your mileage may vary. The plus is that you don't have to go into subnetting your IP range into smaller pieces, put load down from the main firewalls, if you don't change the TTL or other headers there is virtually no way to detect them. The downside is that you add a layer of comlexity and single point of failure. Just my 2 cent. Marc
----- Original Message ----- From: "m p" <sumirati () yahoo de> To: "Shimon Silberschlag" <shimons () bll co il> Sent: Thursday, September 12, 2002 15:56 Subject: Re: [fw-wiz] separating the servers on a switchHi Shimon, please decompress your question && resend it. thanks marc ps: look for the comment. --- Shimon Silberschlag <shimons () bll co il> schrieb: > Lets say wehave aninternet segment, protected by firewalls at bothends. On that segment are various servers. The servers need to talk to other servers outside the segment;uplinkits the internet, downlink the backend servers. Some of the servers need to be able to talk among them.^-- from here on it is not clear which servers are which servers areon whichlink they are.We want to control which server can talk to which other server (inthesegment), utilizing one of the firewalls (lets say the uplinkone).Can the group suggest ways to accomplish that? We thought aboutusingL2 switches with "private VLAN", L3 switches with ACL, butconstantlycome across problems doing the routing properly.
__________________________________________________________________ Gesendet von Yahoo! Mail - http://mail.yahoo.de Möchten Sie mit einem Gruß antworten? http://grusskarten.yahoo.de _______________________________________________ firewall-wizards mailing list firewall-wizards () honor icsalabs com http://honor.icsalabs.com/mailman/listinfo/firewall-wizards _______________________________________________ firewall-wizards mailing list firewall-wizards () honor icsalabs com http://honor.icsalabs.com/mailman/listinfo/firewall-wizards
Current thread:
- Re: separating the servers on a switch m p (Sep 12)
- <Possible follow-ups>
- Re: separating the servers on a switch m p (Sep 12)
- RE: separating the servers on a switch Ian Webb (Sep 14)